International Journal of Education and Management Engineering(IJEME)

ISSN: 2305-3623 (Print), ISSN: 2305-8463 (Online)

Published By: MECS Press

IJEME Vol.7, No.1, Jan. 2017

Random Pattern Standard Bit Embedding for Minimized Histogram Difference

Full Text (PDF, 454KB), PP.54-64

Views:66   Downloads:1


Ravpreet Kaur, Manish Mahajan

Index Terms

Video steganography;cover video;random pattern;autocorrelation;chi square


The rapid development of the transfer of data via internet made it easier to send the correct information and quicker to the destination. Today's massive demand of web applications needs the information to be communicated in a secure manner. The transmission of information in a public communication system isn't secure because of interception and improper manipulation by an eavesdropper. So for this problem, the solution is Steganography, which means the art of hiding information in ways that avert the revealing of hiding messages. Secure video steganography is a difficult task of sending the embedded data to the receiver without being detected. This paper presents a steganographic model which is based on random pattern based sequential bit encoding. The proposed model has been designed to enhance the security level. The video embedding creates the higher level of security for the embedded data. Here the encrypted secret image is embedded into the blocks of a cover video file which is selected using autocorrelation function which measures the similarity between the two images. The embedding is done on the basis of random selection of the pixels in the blocks of cover video. The performance parameters that are used to obtain results are taken in the form of chi-square histogram difference measurements. The proposed model increases the security by using random pattern embedding.

Cite This Paper

Ravpreet Kaur, Manish Mahajan,"Random Pattern Standard Bit Embedding for Minimized Histogram Difference", International Journal of Education and Management Engineering(IJEME), Vol.7, No.1, pp.54-64, 2017.DOI: 10.5815/ijeme.2017.01.06


[1]Mahajan, P., & Sachdeva, A. (2013). A study of Encryption algorithms AES, DES and RSA for security. Global Journal of Computer Science and Technology, 13(15).

[2]Sherly, A. P., & Amritha, P. P. (2010). A compressed video steganography using TPVD. International Journal of Database Management Systems (IJDMS) Vol, 2, 764-766.

[3]Panjabi, P. K., & Singh, P. (2013). An Enhanced Data Hiding Approach using Pixel Mapping Method with Optimal Substitution Approach.International Journal of Computer Applications, 74(10).

[4]Xu, C., Ping, X., & Zhang, T. (2006, August). Steganography in a compressed video stream. In Innovative Computing, Information and Control, 2006. ICICIC'06. First International Conference on (Vol. 1, pp. 269-272). IEEE

[5]Shukla, C. P., & Chadha, M. R. S. (2014). A Survey of Steganography Technique, Attacks, and Applications. International Journal of Advance Research in Computer Science and Software Engineering, 2.

[6]Varghese, B. B., & Haroon, R. P. Reversible Encrypted Data Hiding In Encrypted Video.

[7]Kelash, H. M., Abdel Wahab, O. F., Elshakankiry, O. A., & El-sayed, H. S. (2013, October). Hiding data in video sequences using steganography algorithms. In ICT Convergence (ICTC), 2013 International Conference on(pp. 353-358). IEEE.

[8]Thakare, M. S. S., & Bhale, N. L. A Review of Digital Image Steganography Techniques.

[9]Vyas, K., Pal, B. L. (2014). A Proposed Method in Image Steganography to improve Image Quality with LSB technique. International Journal of Advanced Research in Computer and Communication Engineering 3(2), 5246-5251

[10]Laskar, S. A., & Hemachandran, K. (2013). Steganography based on Random Pixel Selection for Efficient Data Hiding. International Journal of Computer Engineering and Technology, 4(2), 31-44.

[11]Hussain, M., & Hussain, M. (2013). A survey of image steganography techniques.

[12]Mandal, P. C. (2012). Modern Steganographic technique: A survey.International Journal of Computer Science & Engineering Technology (IJCSET), 3(9), 444-448.

[13]Kumar, P. M., & Shunmuganathan, K. L. (2012). Developing a secure image steganographic system using TPVD adaptive LSB matching revisited algorithm for maximizing the embedding rate. Information Security Journal: A Global Perspective, 21(2), 65-70.

[14]Kour, J., & Verma, D. (2014). Steganography Techniques–A Review Paper.International Journal of Emerging Research in Management &Technology ISSN, 2278-9359.

[15]Ramalingam, M., & Isa, N. A. M. (2014, October). A steganography approach for sequential data encoding and decoding in video images. In Computer, Control, Informatics and Its Applications (IC3INA), 2014 International Conference on (pp. 120-125). IEEE.

[16]Kumar, M. S., & Latha, G. M. (2014). DCT Based Secret Image Hiding In Video Sequence. Journal of Engineering Research and Applications www. ijera. com ISSN, 2248-9622.

[17]Wu, D. C., & Tsai, W. H. (2003). A steganographic method for images by pixel-value differencing. Pattern Recognition Letters, 24(9), 1613-1626.

[18]Sharma, M. H., MithleshArya, M., & Goyal, M. D. (2013). Secure Image Hiding Algorithm using Cryptography and Steganography‖. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN, 2278-0661.

[19]Shakir, Ahmed C. "Stego Encrypted Message in Any Language for Network Communication Using Quadratic Method." Journal of Computer Science 6.3 (2010): 320.

[20]Divya, K. P., & Mahesh, K. Random Image Embedded in Videos using LSB Insertion Algorithm.

[21]Pujari, S., & Mukhopadhyay, S. (2012). An Image based Steganography Scheme Implying Pseudo-Random Mapping of Text Segments to Logical Region of Cover Image using a New Block Mapping Function and Randomization Technique. International Journal of Computer Applications, 50(2).

[22]Yadollahpour, A., & Naimi, H. M. (2009). Attack on LSB steganography in color and grayscale images using autocorrelation coefficients. European Journal of Scientific Research, 31(2), 172-183.

[23]Manibharathi, N., Krishnaprasad, S. (2014). Transform DomainTechnique in Image Steganography for Hiding Secret Information. International Journal of Engineering Research & Technology (IJERT), 3(2). pp. 1255-1260.

[24]Juneja, M., & Sandhu, P. S. (2013). A new approach for information security using an improved steganography technique. Journal of Information Processing Systems, 9(3), 405-424.

[25]Singh, S., & Agarwal, G. (2010). Hiding image to a video: A new approach of LSB replacement. International Journal of Engineering Science and Technology, 2(12), 6999-7003.

[26]Jain, Y. K., & Ahirwal, R. R. (2010), "A novel image steganography method with adaptive number of least significant bits modification based on private stego keys," International Journal of Computer Science and Security (IJCSS), 4(1), pp. 40-49.